Analysis
-
max time kernel
150s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
30-03-2024 10:38
Static task
static1
Behavioral task
behavioral1
Sample
3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe
-
Size
311KB
-
MD5
3a7ac1ac60baac512bf45e412aacb90c
-
SHA1
d579493a2190a8f6f44a9094148a494c5368cdc7
-
SHA256
5c88ec7f348d5b457a2f155bbd9b0353c1cb840e0e971013c0ebc58aaee3b715
-
SHA512
08c3a3861a092eb7e39f6aa7255b36e2bf54b1f7a15b7fb76ac5f94269e7879e3a27187af2ee11f7215f5796e35ecd9146d04744ab4a4e01fb29a137589963b9
-
SSDEEP
6144:mLVf3fw4e0wZ4EJjz9QkLOfIf/Hp9hLVxCygVM:4IjZZ4IH9QkOfIfPhJxC9
Malware Config
Extracted
smokeloader
2020
http://linavanandr11.club/
http://iselaharty12.club/
http://giovaninardo13.club/
http://zayneliann14.club/
http://zorinosali15.club/
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes itself 1 IoCs
Processes:
pid process 3380 -
Executes dropped EXE 2 IoCs
Processes:
wjsfhdfwjsfhdfpid process 1376 wjsfhdf 3028 wjsfhdf -
Suspicious use of SetThreadContext 2 IoCs
Processes:
3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exewjsfhdfdescription pid process target process PID 3548 set thread context of 4112 3548 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe PID 1376 set thread context of 3028 1376 wjsfhdf wjsfhdf -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 544 4112 WerFault.exe 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe 2280 3028 WerFault.exe wjsfhdf -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exewjsfhdfdescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wjsfhdf Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wjsfhdf Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wjsfhdf Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exepid process 4112 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe 4112 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 3380 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exewjsfhdfpid process 4112 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe 3028 wjsfhdf -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3380 Token: SeCreatePagefilePrivilege 3380 Token: SeShutdownPrivilege 3380 Token: SeCreatePagefilePrivilege 3380 Token: SeShutdownPrivilege 3380 Token: SeCreatePagefilePrivilege 3380 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3380 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exewjsfhdfdescription pid process target process PID 3548 wrote to memory of 4112 3548 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe PID 3548 wrote to memory of 4112 3548 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe PID 3548 wrote to memory of 4112 3548 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe PID 3548 wrote to memory of 4112 3548 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe PID 3548 wrote to memory of 4112 3548 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe PID 3548 wrote to memory of 4112 3548 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe 3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe PID 1376 wrote to memory of 3028 1376 wjsfhdf wjsfhdf PID 1376 wrote to memory of 3028 1376 wjsfhdf wjsfhdf PID 1376 wrote to memory of 3028 1376 wjsfhdf wjsfhdf PID 1376 wrote to memory of 3028 1376 wjsfhdf wjsfhdf PID 1376 wrote to memory of 3028 1376 wjsfhdf wjsfhdf PID 1376 wrote to memory of 3028 1376 wjsfhdf wjsfhdf -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a7ac1ac60baac512bf45e412aacb90c_JaffaCakes118.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 3283⤵
- Program crash
PID:544
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4112 -ip 41121⤵PID:3400
-
C:\Users\Admin\AppData\Roaming\wjsfhdfC:\Users\Admin\AppData\Roaming\wjsfhdf1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Roaming\wjsfhdfC:\Users\Admin\AppData\Roaming\wjsfhdf2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 3283⤵
- Program crash
PID:2280
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3028 -ip 30281⤵PID:2688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
311KB
MD53a7ac1ac60baac512bf45e412aacb90c
SHA1d579493a2190a8f6f44a9094148a494c5368cdc7
SHA2565c88ec7f348d5b457a2f155bbd9b0353c1cb840e0e971013c0ebc58aaee3b715
SHA51208c3a3861a092eb7e39f6aa7255b36e2bf54b1f7a15b7fb76ac5f94269e7879e3a27187af2ee11f7215f5796e35ecd9146d04744ab4a4e01fb29a137589963b9